Maximal Antichain Lattice Algorithms for Distributed Computatio

Size: px
Start display at page:

Download "Maximal Antichain Lattice Algorithms for Distributed Computatio"

Transcription

1 Maximal Antichain Lattice Algorithms for Distributed Computations Vijay K. Garg Parallel and Distributed Systems Lab, Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX garg

2 Model of a Distributed Computation: Poset distributed computation = poset (partially ordered set) (E, ) where E = is the set of events, and is (happened-before) relation. P1 a d P1 (1,0,0) (2,1,0) P2 b f P2 (0,1,0) (0,2,1) P3 c e P3 (0,0,1) (1,0,2) (i) Events can be timestamped in an online fashion using Vector Clocks such that e f V (e) < V (f ). (ii)

3 Computing Meet and Join d e f a b c Meet of a subset of events meet of {d, e} meet of {a,b} meet of {e,f} Join of a subset of events Lattice: a poset in which all finite subsets have meets and joins.

4 Consistent Cuts of a Distributed System G 1 G 2 P 1 P 2 P 3 m 1 m 2 m 3 Consistent cut = set of events executed so far A subset G of E is a consistent cut (consistent global state) if e, f E : (f G) (e f ) (e G) Same as the order ideal of the partial order (E, ).

5 Motivation: Detecting Global Conditions in Distributed Systems {a,b,c,d,e,f} {a,b,c,d,e} {a,b,c,d,f} {a,b,c,e,f} {a,b,c,d} {a,b,c,e} {a,b,c,f} {a,b,d} {a,c,e} {a,b,c} {b,c,f} {a,b} {a,c} {b,c} {d,e,f} d e f {a} {b} {c} {a,f} {c,d} {b,e} a b c {} {a,b,c} Traversing a significantly smaller lattice of maximal antichains rather than consistent cuts for certain predicates

6 Outline of the Talk Motivation Incremental Lattice Algorithms Lattice Enumeration Algorithms Applications to Global Predicate Detection Conclusions and Future Work

7 Ideals and Antichains d e f a b c Poset P = (X, ) Ideal: Q X is an ideal if f is in Q and e f, then e is also in Q. Antichain: Y X is called an antichain, if every distinct pair of elements from Y are incomparable.

8 Maximal Antichains {a,b,c,d,e,f} {d,e,f} d e f {a,b,c,f} {a,b,c,d} {a,b,c,e} {a,f} {c,d} {b,e} a b c {a,b,c} {a,b,c} Maximal Antichain: An antichain A is maximal if every element not in A is comparable to some element in A. {d, e} is an antichain but not a maximal antichain {d, e, f } is a maximal antichain Maximal Ideal: An ideal Q is maximal antichain ideal if its maximal elements forms a maximal antichain. {a, b, c, d} and {a, b, c, e} are maximal ideals {a, b, c, d, e} is not a maximal ideal

9 Important Lattices Associated with a Poset Lattice of Interpretation in DC References Ideals consistent global states [Mattern88, CM91,..] Normal Cuts Smallest lattice containing P [Garg OPODIS12] Maximal Ideals State for maximal antichain [JRJ94, this paper] Table: Summary of Lattices for Distributed Computations modeled as a poset P

10 Related Work: Incremental Algorithms Elements of the computation arrive in a sorted order Input: poset P, its lattice of maximal antichains L, element x Output: L := lattice of maximal antichains of P {x} Incremental Algorithms Time Complexity Space Complexity [Jourdan, Rampon, Jard 94] O(w 3 m) O(mn log n) [Nourine and Raynaud 99, 02] O(mn) O(mn log n) Algorithm ILMA [this paper] O(wm log m) O(mw log n) Algorithm OLMA [this paper] O(m x w 2 log w L )) O(w L w log n) Symbol Definition Symbol Definition n size of the poset P m size of the lattice L w width of the poset P m x # (strict ideals D(x)) w L width of the lattice L

11 Strict Ideals D(A) = the set of elements strictly smaller than A Strict Ideal: A set Y is a strict ideal if there exists an antichain A such that D(A) = Y. d e f a b c Example: {a, b} is a strict ideal. {a, b, c, d} is not.

12 Equivalence of maximal ideals and strict ideals d e f a b c {a,b,c,d,e,f} {d,e,f} {a,b,c} {a,b,c,f} {a,b,c,d} {a,b,c,e} {a,f} {c,d} {b,e} {b,c} {a,b} {a,c} {a,b,c} {a,b,c} {} Lattices of maximal ideals, maximal antichains, and strict ideals are isomorphic. Mapping from strict ideals to maximal antichains: S is mapped to the minimal elements of the complement of S.

13 Incremental Algorithm 1 Input: P: a finite poset as a list of vector clocks L: lattice of maximal antichains of vector clocks x: new element Output: L := Lattice of maximal antichains of P {x} initially L // Step 1: Compute the set D(x) Let V be the vector clock for x on process P i ; S := V ; S[i] := S[i] 1; // Step 2: if S L then L := L {S}; forall vectors W L: if max(w, S) L then L := L max(w, S);

14 Example Poset and its lattice of maximal antichains (3,2,2) (3,2,1) (2,1,2) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)

15 Example Step 1: D[x] = (1, 0, 0) D(x) = (0, 0, 0), strict ideals added: (0, 0, 0) Set of Maximal Antichains = {(1, 0, 0)} (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (1,0,0) (1,0,0)

16 Example Step 2: D[x] = (2, 0, 0) D(x) = (1, 0, 0), strict ideals added: (1, 0, 0) Set of Maximal Antichains = {(1, 0, 0), (2, 1, 1)} (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)

17 Example Step 3: D[x] = (1, 1, 0) D(x) = (1, 0, 0), strict ideals added: φ Set of Maximal Antichains = {(1, 0, 0), (2, 1, 1)} (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)

18 Example Step 4: D[x] = (1, 0, 1) D(x) = (1, 0, 0), strict ideals added: φ (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)

19 Example Step 5: D[x] = (3, 0, 0) D(x) = (2, 0, 0), strict ideals added: (2, 0, 0) Maximal antichain added: (3, 1, 1) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)

20 Example Step 6: D[x] = (2, 2, 0) D(x) = (2, 1, 0), strict ideals added: (2, 1, 0) Maximal antichain added: (3, 2, 1) (3,2,1) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)

21 Example Step 6: D[x] = (1, 1, 2) D(x) = (1, 1, 1), strict ideals added: (1, 1, 1), (2, 1, 1) Maximal antichains added: {(2, 1, 2), (3, 2, 2)} (3,2,2) (3,2,1) (2,1,2) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)

22 Analysis of the Incremental Algorithm 1 1 Simple Algorithm 2 To check if max(s, W ) L, maintain L as a binary search tree 3 Requires storage of the the entire lattice (exponential in size of the poset in the worst case)

23 Space Efficient Incremental Algorithm Input: a finite poset P, x maximal element in P = P {x} Output: enumerate M such that L MA (P ) = L MA (P) M (1) S := the vector clock for x on process P i ; (2) S[i] := S[i] 1; (3) if S is not a strict ideal of P then (4) // BFS(S): Do Breadth-First-Search traversal of M (5) T := set of vectors initially {S}; (6) while T is nonempty do (7) H := delete the smallest vector from T ; (8) enumerate H; (9) foreach process k with next event e do (10) explore H using e; (11) endfor; (12) endwhile; (13) endif;

24 Outline of the Talk Motivation Incremental Lattice Algorithms Lattice Enumeration Algorithms Applications to Global Predicate Detection Conclusions and Future Work

25 Motivation for Enumeration of Maximal Antichains Global predicate detection requires enumeration not construction of the lattice Lattice of maximal antichains may be exponential in the number of processes

26 Related Work: Enumeration Algorithms Input: a nonempty finite poset P Output: enumerate all elements of L := DM-completion of P Algorithm Time Space [Jourdan, Rampon, Jard 94] O((n + w 2 )wm) O(mn log n) [Nourine and Raynaud 99, 02] O(mn 2 ) O(mn log n) Algorithm ILMA [this paper] O(nwm log m) O(mw log n) BFS-MA [this paper] O(mw 2 log m) O(w L w log n) DFS-MA [this paper] O(mw 4 ) O(nw log n) Lexical by [Ganter84] O(mn 3 ) O(n log n) The parameters are: n: size of the poset P, m: size of the lattice L of normal cuts of P, w: width of the poset P, w L : width of the lattice L.

27 Enumeration using Closed Sets closure(y ) = smallest maximal antichain ideal that contains Y. The operator closure(y ) is monotone, extensive and idempotent. Idea: View the lattice of maximal antichains as a directed graph and enumerate the nodes of the graph using the closure operator. Difficulty: Usual DFS on graph cannot be employed as the graph cannot be stored. Cannot mark which nodes have been visited before.

28 Depth First Search Enumeration of Maximal Antichain Ideals Input: a finite poset P, starting state G Output: DFS Enumeration of Maximal Antichain Ideals of P (1) output(g); (2) foreach event e enabled in G do (3) K := closure(g {e}); (4) if (K covers G) and (not visited before) then (5) DFS(K);

29 How to avoid revisiting cuts? Visit a state only from the maximum predecessor. (4) if K does not cover G then go to the next event; (5) M := get-max-predecessor(k) ; (6) if M = G then (7) DFS-MaximalIdeals(K); To check whether K covers G: use the efficient characterization provided by [Reuter 91]. To choose the maximum predecessor Expand the nodes of the dual poset and choose the biggest predecessor

30 Outline of the Talk Motivation Incremental Lattice Algorithms Lattice Enumeration Algorithms Applications to Global Predicate Detection Conclusions and Future Work

31 Application to Global Predicate Detection Definition (Antichain-Consistent Predicate) A global predicate is an antichain-consistent predicate if 1 its evaluation depends only on maximal events of a consistent global state and 2 if it is true on a subset of processes, then presence of additional processes does not falsify the predicate. Examples of antichain-consistent predicates Violation of mutual exclusion: there is more than one process in the critical section. Violation of resource usage: there are more than k concurrent activation of certain service, Global Control Point: The predicate, B, Process P 1 is at line 35 and P 2 is at line 23 concurrently,

32 Equivalence in Global Predicate Detection Theorem There exists a consistent global state that satisfies an antichain-consistent predicate B iff there exists a maximal ideal that satisfies B.

33 Conclusions and Future Work An Incremental Algorithm to generate the lattice of maximal antichains BFS and DFS enumeration of maximal antichains Applications to global predicate detection Question: Is there a space-efficient algorithm with time complexity O(mw log n)?

Formal Methods for Monitoring Distributed Computations

Formal Methods for Monitoring Distributed Computations Formal Methods for Monitoring Distributed Computations Vijay K. Garg Parallel and Distributed Systems Lab, Department of Electrical and Computer Engineering, The University of Texas at Austin, FRIDA 15

More information

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr.

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Quiz 1 Appendix Appendix Contents 1 Induction 2 2 Relations

More information

The One-Quarter Fraction

The One-Quarter Fraction The One-Quarter Fraction ST 516 Need two generating relations. E.g. a 2 6 2 design, with generating relations I = ABCE and I = BCDF. Product of these is ADEF. Complete defining relation is I = ABCE = BCDF

More information

Data Mining and Analysis: Fundamental Concepts and Algorithms

Data Mining and Analysis: Fundamental Concepts and Algorithms Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA

More information

Strange Combinatorial Connections. Tom Trotter

Strange Combinatorial Connections. Tom Trotter Strange Combinatorial Connections Tom Trotter Georgia Institute of Technology trotter@math.gatech.edu February 13, 2003 Proper Graph Colorings Definition. A proper r- coloring of a graph G is a map φ from

More information

Solved and Unsolved Problems in Monitoring Distributed Computations

Solved and Unsolved Problems in Monitoring Distributed Computations Solved and Unsolved Problems in Monitoring Distributed Computations Vijay K. Garg Parallel and Distributed Systems Lab, Department of Electrical and Computer Engineering, The University of Texas at Austin,

More information

Homework 02 Solution updated

Homework 02 Solution updated CS3-Automata and Complexity Theory Homework 2 Solution updated Due On: 5hrs Wednesday, December 2, 25 Max Points: 25 Problem [5+5+5+ points] Give DFA for the following languages, over the alphabet {,}

More information

Fractional Replications

Fractional Replications Chapter 11 Fractional Replications Consider the set up of complete factorial experiment, say k. If there are four factors, then the total number of plots needed to conduct the experiment is 4 = 1. When

More information

Applying Predicate Detection to the Constrained Optimization Problems

Applying Predicate Detection to the Constrained Optimization Problems Applying Predicate Detection to the Constrained Optimization Problems Vijay K. Garg, The University of Texas at Austin, Department of Electrical and Computer Engineering, Austin, TX 78712, USA arxiv:1812.10431v1

More information

ASSOCIATION ANALYSIS FREQUENT ITEMSETS MINING. Alexandre Termier, LIG

ASSOCIATION ANALYSIS FREQUENT ITEMSETS MINING. Alexandre Termier, LIG ASSOCIATION ANALYSIS FREQUENT ITEMSETS MINING, LIG M2 SIF DMV course 207/208 Market basket analysis Analyse supermarket s transaction data Transaction = «market basket» of a customer Find which items are

More information

Efficient Dependency Tracking for Relevant Events in Concurrent Systems

Efficient Dependency Tracking for Relevant Events in Concurrent Systems Distributed Computing manuscript No. (will be inserted by the editor) Anurag Agarwal Vijay K. Garg Efficient Dependency Tracking for Relevant Events in Concurrent Systems Received: date / Accepted: date

More information

Relations, Functions, Binary Relations (Chapter 1, Sections 1.2, 1.3)

Relations, Functions, Binary Relations (Chapter 1, Sections 1.2, 1.3) Relations, Functions, Binary Relations (Chapter 1, Sections 1.2, 1.3) CmSc 365 Theory of Computation 1. Relations Definition: Let A and B be two sets. A relation R from A to B is any set of ordered pairs

More information

On the Compounds of Hat Matrix for Six-Factor Central Composite Design with Fractional Replicates of the Factorial Portion

On the Compounds of Hat Matrix for Six-Factor Central Composite Design with Fractional Replicates of the Factorial Portion American Journal of Computational and Applied Mathematics 017, 7(4): 95-114 DOI: 10.593/j.ajcam.0170704.0 On the Compounds of Hat Matrix for Six-Factor Central Composite Design with Fractional Replicates

More information

2 Equivalence Relations

2 Equivalence Relations 2 Equivalence Relations In mathematics, we often investigate relationships between certain objects (numbers, functions, sets, figures, etc.). If an element a of a set A is related to an element b of a

More information

Fast Detection of Stable and Count Predicates in Parallel Computations

Fast Detection of Stable and Count Predicates in Parallel Computations Fast Detection of Stable and Count Predicates in Parallel Computations Himanshu Chauhan 1 and Vijay K. Garg 1 1 University of Texas at Austin {himanshu@, garg@ece.}utexas.edu Abstract Enumerating all consistent

More information

The dependence graph of a lattice

The dependence graph of a lattice The depence graph of a lattice Karell Bertet L3I - Université de La Rochelle - av Michel Crépeau - 17042 La Rochelle kbertet@univ-lr.fr Abstract: In this paper, we introduce the depence graph of a lattice

More information

Posets, homomorphisms, and homogeneity

Posets, homomorphisms, and homogeneity Posets, homomorphisms, and homogeneity Peter J. Cameron p.j.cameron@qmul.ac.uk Dedicated to Jarik Nešetřil on his sixtieth birthday HAPPY BIRTHDAY JARIK! Summary Jarik Nešetřil has made deep contributions

More information

A combinatorial view on derived codes

A combinatorial view on derived codes A combinatorial view on derived codes Relinde Jurrius (joint work with Philippe Cara) Vrije Universiteit Brussel, Belgium University of Neuchâtel, Switzerland Finite Geometries September 16, 2014 Relinde

More information

Relations on Hypergraphs

Relations on Hypergraphs Relations on Hypergraphs John Stell School of Computing, University of Leeds RAMiCS 13 Cambridge, 17th September 2012 Relations on a Set Boolean algebra Converse R = R Complement R = R Composition & residuation

More information

International Mathematical Olympiad. Preliminary Selection Contest 2004 Hong Kong. Outline of Solutions 3 N

International Mathematical Olympiad. Preliminary Selection Contest 2004 Hong Kong. Outline of Solutions 3 N International Mathematical Olympiad Preliminary Selection Contest 004 Hong Kong Outline of Solutions Answers:. 8. 0. N 4. 49894 5. 6. 004! 40 400 7. 6 8. 7 9. 5 0. 0. 007. 8066. π + 4. 5 5. 60 6. 475 7.

More information

Antichain Algorithms for Finite Automata

Antichain Algorithms for Finite Automata Antichain Algorithms for Finite Automata Laurent Doyen 1 and Jean-François Raskin 2 1 LSV, ENS Cachan & CNRS, France 2 U.L.B., Université Libre de Bruxelles, Belgium Abstract. We present a general theory

More information

Automata-based Verification - III

Automata-based Verification - III COMP30172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2009 Third Topic Infinite Word Automata Motivation Büchi Automata

More information

0 1 d 010. h 0111 i g 01100

0 1 d 010. h 0111 i g 01100 CMSC 5:Fall 07 Dave Mount Solutions to Homework : Greedy Algorithms Solution : The code tree is shown in Fig.. a 0000 c 0000 b 00 f 000 d 00 g 000 h 0 i 00 e Prob / / /8 /6 / Depth 5 Figure : Solution

More information

Multiple Choice Questions for Review

Multiple Choice Questions for Review Equivalence and Order Multiple Choice Questions for Review In each case there is one correct answer (given at the end of the problem set). Try to work the problem first without looking at the answer. Understand

More information

Algorithms: Lecture 12. Chalmers University of Technology

Algorithms: Lecture 12. Chalmers University of Technology Algorithms: Lecture 1 Chalmers University of Technology Today s Topics Shortest Paths Network Flow Algorithms Shortest Path in a Graph Shortest Path Problem Shortest path network. Directed graph G = (V,

More information

A NEW CHARACTERIZATION OF COMPLETE HEYTING AND CO-HEYTING ALGEBRAS

A NEW CHARACTERIZATION OF COMPLETE HEYTING AND CO-HEYTING ALGEBRAS Logical Methods in Computer Science Vol. 13(3:252017, pp. 1 11 www.lmcs-online.org Submitted Apr. 15, 2015 Published Sep. 14, 2017 A NEW CHARACTERIZATION OF COMPLETE HEYTING AND CO-HEYTING ALGEBRAS FRANCESCO

More information

FRACTIONAL REPLICATION

FRACTIONAL REPLICATION FRACTIONAL REPLICATION M.L.Agarwal Department of Statistics, University of Delhi, Delhi -. In a factorial experiment, when the number of treatment combinations is very large, it will be beyond the resources

More information

Efficient Dependency Tracking for Relevant Events in Shared-Memory Systems

Efficient Dependency Tracking for Relevant Events in Shared-Memory Systems Efficient Dependency Tracking for Relevant Events in Shared-Memory Systems Anurag Agarwal Dept of Computer Sciences The University of Texas at Austin Austin, TX 78712-233, USA anurag@cs.utexas.edu Vijay

More information

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2 Asymptotic Analysis Slides by Carl Kingsford Jan. 27, 2014 AD Chapter 2 Independent Set Definition (Independent Set). Given a graph G = (V, E) an independent set is a set S V if no two nodes in S are joined

More information

Construction of Mixed-Level Orthogonal Arrays for Testing in Digital Marketing

Construction of Mixed-Level Orthogonal Arrays for Testing in Digital Marketing Construction of Mixed-Level Orthogonal Arrays for Testing in Digital Marketing Vladimir Brayman Webtrends October 19, 2012 Advantages of Conducting Designed Experiments in Digital Marketing Availability

More information

COMP 355 Advanced Algorithms

COMP 355 Advanced Algorithms COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Running Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that

More information

Phylogenetic Analysis. Han Liang, Ph.D. Assistant Professor of Bioinformatics and Computational Biology UT MD Anderson Cancer Center

Phylogenetic Analysis. Han Liang, Ph.D. Assistant Professor of Bioinformatics and Computational Biology UT MD Anderson Cancer Center Phylogenetic Analysis Han Liang, Ph.D. Assistant Professor of Bioinformatics and Computational Biology UT MD Anderson Cancer Center Outline Basic Concepts Tree Construction Methods Distance-based methods

More information

Undirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11

Undirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11 Undirected Graphs Undirected graph. G = (V, E) V = nodes. E = edges between pairs of nodes. Captures pairwise relationship between objects. Graph size parameters: n = V, m = E. V = {, 2, 3,,,, 7, 8 } E

More information

Section Summary. Relations and Functions Properties of Relations. Combining Relations

Section Summary. Relations and Functions Properties of Relations. Combining Relations Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included

More information

Reading: Chapter 9.3. Carnegie Mellon

Reading: Chapter 9.3. Carnegie Mellon I II Lecture 3 Foundation of Data Flow Analysis Semi-lattice (set of values, meet operator) Transfer functions III Correctness, precision and convergence IV Meaning of Data Flow Solution Reading: Chapter

More information

5. Data dependences and database schema design. Witold Rekuć Data Processing Technology 104

5. Data dependences and database schema design. Witold Rekuć Data Processing Technology 104 5. Data dependences and database schema design Witold Rekuć Data Processing Technology 104 DESIGN OF TABLES Anomalies of data modifications Key = {StoreNo, ProdId, DateOfSale} Witold Rekuć Data Processing

More information

A Survey of Rational Diophantine Sextuples of Low Height

A Survey of Rational Diophantine Sextuples of Low Height A Survey of Rational Diophantine Sextuples of Low Height Philip E Gibbs philegibbs@gmail.com A rational Diophantine m-tuple is a set of m distinct positive rational numbers such that the product of any

More information

COMP 182 Algorithmic Thinking. Relations. Luay Nakhleh Computer Science Rice University

COMP 182 Algorithmic Thinking. Relations. Luay Nakhleh Computer Science Rice University COMP 182 Algorithmic Thinking Relations Luay Nakhleh Computer Science Rice University Chapter 9, Section 1-6 Reading Material When we defined the Sorting Problem, we stated that to sort the list, the elements

More information

FRACTIONAL FACTORIAL

FRACTIONAL FACTORIAL FRACTIONAL FACTORIAL NURNABI MEHERUL ALAM M.Sc. (Agricultural Statistics), Roll No. 443 I.A.S.R.I, Library Avenue, New Delhi- Chairperson: Dr. P.K. Batra Abstract: Fractional replication can be defined

More information

COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background

COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that checks every

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

Goal. Partially-ordered set. Game plan 2/2/2013. Solving fixpoint equations

Goal. Partially-ordered set. Game plan 2/2/2013. Solving fixpoint equations Goal Solving fixpoint equations Many problems in programming languages can be formulated as the solution of a set of mutually recursive equations: D: set, f,g:dxd D x = f(x,y) y = g(x,y) Examples Parsing:

More information

Geometry Chapter 3 3-6: PROVE THEOREMS ABOUT PERPENDICULAR LINES

Geometry Chapter 3 3-6: PROVE THEOREMS ABOUT PERPENDICULAR LINES Geometry Chapter 3 3-6: PROVE THEOREMS ABOUT PERPENDICULAR LINES Warm-Up 1.) What is the distance between the points (2, 3) and (5, 7). 2.) If < 1 and < 2 are complements, and m < 1 = 49, then what is

More information

2.2 Asymptotic Order of Growth. definitions and notation (2.2) examples (2.4) properties (2.2)

2.2 Asymptotic Order of Growth. definitions and notation (2.2) examples (2.4) properties (2.2) 2.2 Asymptotic Order of Growth definitions and notation (2.2) examples (2.4) properties (2.2) Asymptotic Order of Growth Upper bounds. T(n) is O(f(n)) if there exist constants c > 0 and n 0 0 such that

More information

CS 584 Data Mining. Association Rule Mining 2

CS 584 Data Mining. Association Rule Mining 2 CS 584 Data Mining Association Rule Mining 2 Recall from last time: Frequent Itemset Generation Strategies Reduce the number of candidates (M) Complete search: M=2 d Use pruning techniques to reduce M

More information

Skylines. Yufei Tao. ITEE University of Queensland. INFS4205/7205, Uni of Queensland

Skylines. Yufei Tao. ITEE University of Queensland. INFS4205/7205, Uni of Queensland Yufei Tao ITEE University of Queensland Today we will discuss problems closely related to the topic of multi-criteria optimization, where one aims to identify objects that strike a good balance often optimal

More information

Automata-based Verification - III

Automata-based Verification - III CS3172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20/22: email: howard.barringer@manchester.ac.uk March 2005 Third Topic Infinite Word Automata Motivation Büchi Automata

More information

Pin-Permutations: Characterization and Generating Function. Frédérique Bassino Mathilde Bouvel Dominique Rossin

Pin-Permutations: Characterization and Generating Function. Frédérique Bassino Mathilde Bouvel Dominique Rossin : Characterization and Generating Function Frédérique Bassino Dominique Rossin Journées Permutations et Combinatoire, Projet ANR GAMMA, Nov. 2008 liafa Main result of the talk Conjecture[Brignall, Ruškuc,

More information

Introduction to Kleene Algebras

Introduction to Kleene Algebras Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)

More information

Model Checking with CTL. Presented by Jason Simas

Model Checking with CTL. Presented by Jason Simas Model Checking with CTL Presented by Jason Simas Model Checking with CTL Based Upon: Logic in Computer Science. Huth and Ryan. 2000. (148-215) Model Checking. Clarke, Grumberg and Peled. 1999. (1-26) Content

More information

Event Operators: Formalization, Algorithms, and Implementation Using Interval- Based Semantics

Event Operators: Formalization, Algorithms, and Implementation Using Interval- Based Semantics Department of Computer Science and Engineering University of Texas at Arlington Arlington, TX 76019 Event Operators: Formalization, Algorithms, and Implementation Using Interval- Based Semantics Raman

More information

Maximum Flow Problem (Ford and Fulkerson, 1956)

Maximum Flow Problem (Ford and Fulkerson, 1956) Maximum Flow Problem (Ford and Fulkerson, 196) In this problem we find the maximum flow possible in a directed connected network with arc capacities. There is unlimited quantity available in the given

More information

From Distributions to Markov Networks. Sargur Srihari

From Distributions to Markov Networks. Sargur Srihari From Distributions to Markov Networks Sargur srihari@cedar.buffalo.edu 1 Topics The task: How to encode independencies in given distribution P in a graph structure G Theorems concerning What type of Independencies?

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket

More information

Lecture 12: 2 k p Fractional Factorial Design

Lecture 12: 2 k p Fractional Factorial Design Lecture 12: 2 k p Fractional Factorial Design Montgomery: Chapter 8 Page 1 Fundamental Principles Regarding Factorial Effects Suppose there are k factors (A,B,...,J,K) in an experiment. All possible factorial

More information

The VLDB Journal Using Functional Dependencies for Optimizing Multidimensional Skyline Queries

The VLDB Journal Using Functional Dependencies for Optimizing Multidimensional Skyline Queries The VLDB Journal Using Functional Dependencies for Optimizing Multidimensional Skyline Queries --Manuscript Draft-- Manuscript Number: Full Title: Article Type: Keywords: Corresponding Author: Using Functional

More information

α-acyclic Joins Jef Wijsen May 4, 2017

α-acyclic Joins Jef Wijsen May 4, 2017 α-acyclic Joins Jef Wijsen May 4, 2017 1 Motivation Joins in a Distributed Environment Assume the following relations. 1 M[NN, Field of Study, Year] stores data about students of UMONS. For example, (19950423158,

More information

Automata and Languages

Automata and Languages Automata and Languages Prof. Mohamed Hamada Software Engineering Lab. The University of Aizu Japan Mathematical Background Mathematical Background Sets Relations Functions Graphs Proof techniques Sets

More information

Two Applications of Maximum Flow

Two Applications of Maximum Flow Two Applications of Maximum Flow The Bipartite Matching Problem a bipartite graph as a flow network maximum flow and maximum matching alternating paths perfect matchings 2 Circulation with Demands flows

More information

Association Rules. Fundamentals

Association Rules. Fundamentals Politecnico di Torino Politecnico di Torino 1 Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket counter Association rule

More information

MATH602: APPLIED STATISTICS

MATH602: APPLIED STATISTICS MATH602: APPLIED STATISTICS Dr. Srinivas R. Chakravarthy Department of Science and Mathematics KETTERING UNIVERSITY Flint, MI 48504-4898 Lecture 10 1 FRACTIONAL FACTORIAL DESIGNS Complete factorial designs

More information

Covering Linear Orders with Posets

Covering Linear Orders with Posets Covering Linear Orders with Posets Proceso L. Fernandez, Lenwood S. Heath, Naren Ramakrishnan, and John Paul C. Vergara Department of Information Systems and Computer Science, Ateneo de Manila University,

More information

Collinearity/Concurrence

Collinearity/Concurrence Collinearity/Concurrence Ray Li (rayyli@stanford.edu) June 29, 2017 1 Introduction/Facts you should know 1. (Cevian Triangle) Let ABC be a triangle and P be a point. Let lines AP, BP, CP meet lines BC,

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

MAD. Models & Algorithms for Distributed systems -- 2/5 -- download slides at

MAD. Models & Algorithms for Distributed systems -- 2/5 -- download slides at MAD Models & Algorithms for Distributed systems -- /5 -- download slides at http://people.rennes.inria.fr/eric.fabre/ 1 Today Runs/executions of a distributed system are partial orders of events We introduce

More information

The Meet-Over-All-Paths Solution to Data-Flow Problems

The Meet-Over-All-Paths Solution to Data-Flow Problems The Meet-Over-All-Paths Solution to Data-Flow Problems Consider a monotone dataflow framework (L,,F). Assume that the functions f B F represent the effect of a basic block on the sets conatining data for

More information

D B M G. Association Rules. Fundamentals. Fundamentals. Elena Baralis, Silvia Chiusano. Politecnico di Torino 1. Definitions.

D B M G. Association Rules. Fundamentals. Fundamentals. Elena Baralis, Silvia Chiusano. Politecnico di Torino 1. Definitions. Definitions Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Itemset is a set including one or more items Example: {Beer, Diapers} k-itemset is an itemset that contains k

More information

{a, b, c} {a, b} {a, c} {b, c} {a}

{a, b, c} {a, b} {a, c} {b, c} {a} Section 4.3 Order Relations A binary relation is an partial order if it transitive and antisymmetric. If R is a partial order over the set S, we also say, S is a partially ordered set or S is a poset.

More information

D B M G. Association Rules. Fundamentals. Fundamentals. Association rules. Association rule mining. Definitions. Rule quality metrics: example

D B M G. Association Rules. Fundamentals. Fundamentals. Association rules. Association rule mining. Definitions. Rule quality metrics: example Association rules Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket

More information

Mining Approximative Descriptions of Sets Using Rough Sets

Mining Approximative Descriptions of Sets Using Rough Sets Mining Approximative Descriptions of Sets Using Rough Sets Dan A. Simovici University of Massachusetts Boston, Dept. of Computer Science, 100 Morrissey Blvd. Boston, Massachusetts, 02125 USA dsim@cs.umb.edu

More information

Divide-and-Conquer Algorithms Part Two

Divide-and-Conquer Algorithms Part Two Divide-and-Conquer Algorithms Part Two Recap from Last Time Divide-and-Conquer Algorithms A divide-and-conquer algorithm is one that works as follows: (Divide) Split the input apart into multiple smaller

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

Design theory for relational databases

Design theory for relational databases Design theory for relational databases 1. Consider a relation with schema R(A,B,C,D) and FD s AB C, C D and D A. a. What are all the nontrivial FD s that follow from the given FD s? You should restrict

More information

Automatic Verification of Parameterized Data Structures

Automatic Verification of Parameterized Data Structures Automatic Verification of Parameterized Data Structures Jyotirmoy V. Deshmukh, E. Allen Emerson and Prateek Gupta The University of Texas at Austin The University of Texas at Austin 1 Outline Motivation

More information

ClC (X ) : X ω X } C. (11)

ClC (X ) : X ω X } C. (11) With each closed-set system we associate a closure operation. Definition 1.20. Let A, C be a closed-set system. Define Cl C : : P(A) P(A) as follows. For every X A, Cl C (X) = { C C : X C }. Cl C (X) is

More information

Notation Index. gcd(a, b) (greatest common divisor) NT-16

Notation Index. gcd(a, b) (greatest common divisor) NT-16 Notation Index (for all) B A (all functions) B A = B A (all functions) SF-18 (n) k (falling factorial) SF-9 a R b (binary relation) C(n,k) = n! k! (n k)! (binomial coefficient) SF-9 n! (n factorial) SF-9

More information

Frequent Itemset Mining

Frequent Itemset Mining ì 1 Frequent Itemset Mining Nadjib LAZAAR LIRMM- UM COCONUT Team (PART I) IMAGINA 17/18 Webpage: http://www.lirmm.fr/~lazaar/teaching.html Email: lazaar@lirmm.fr 2 Data Mining ì Data Mining (DM) or Knowledge

More information

Computational Complexity. IE 496 Lecture 6. Dr. Ted Ralphs

Computational Complexity. IE 496 Lecture 6. Dr. Ted Ralphs Computational Complexity IE 496 Lecture 6 Dr. Ted Ralphs IE496 Lecture 6 1 Reading for This Lecture N&W Sections I.5.1 and I.5.2 Wolsey Chapter 6 Kozen Lectures 21-25 IE496 Lecture 6 2 Introduction to

More information

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,

More information

The Relative Complexity of Updates for a Class of Database Views

The Relative Complexity of Updates for a Class of Database Views The Relative Complexity of Updates for a Class of Database Views Stephen J. Hegner Umeå University Department of Computing Science SE-901 87 Umeå, Sweden hegner@cs.umu.se http://www.cs.umu.se/~hegner Abstract.

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Finding optimal configurations ( combinatorial optimization)

Finding optimal configurations ( combinatorial optimization) CS 1571 Introduction to AI Lecture 10 Finding optimal configurations ( combinatorial optimization) Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square Constraint satisfaction problem (CSP) Constraint

More information

CS 484 Data Mining. Association Rule Mining 2

CS 484 Data Mining. Association Rule Mining 2 CS 484 Data Mining Association Rule Mining 2 Review: Reducing Number of Candidates Apriori principle: If an itemset is frequent, then all of its subsets must also be frequent Apriori principle holds due

More information

2. ALGORITHM ANALYSIS

2. ALGORITHM ANALYSIS 2. ALGORITHM ANALYSIS computational tractability asymptotic order of growth survey of common running times Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos

More information

Visit: ImperialStudy.com For More Study Materials Class IX Chapter 12 Heron s Formula Maths

Visit: ImperialStudy.com For More Study Materials Class IX Chapter 12 Heron s Formula Maths Exercise 1.1 1. Find the area of a triangle whose sides are respectively 150 cm, 10 cm and 00 cm. The triangle whose sides are a = 150 cm b = 10 cm c = 00 cm The area of a triangle = s(s a)(s b)(s c) Here

More information

Breadth First Search, Dijkstra s Algorithm for Shortest Paths

Breadth First Search, Dijkstra s Algorithm for Shortest Paths CS 374: Algorithms & Models of Computation, Spring 2017 Breadth First Search, Dijkstra s Algorithm for Shortest Paths Lecture 17 March 1, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 42 Part I Breadth

More information

Design of a Sliding Window over Asynchronous Event Streams

Design of a Sliding Window over Asynchronous Event Streams 1 Design of a Sliding Window over Asynchronous Event Streams Yiling Yang 1,2, Yu Huang 1,2, Jiannong Cao 3, Xiaoxing Ma 1,2, Jian Lu 1,2 1 State Key Laboratory for Novel Software Technology Nanjing University,

More information

Methods for finding optimal configurations

Methods for finding optimal configurations CS 1571 Introduction to AI Lecture 9 Methods for finding optimal configurations Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Search for the optimal configuration Optimal configuration search:

More information

Class 5. Review; questions. Data-flow Analysis Review. Slicing overview Problem Set 2: due 9/3/09 Problem Set 3: due 9/8/09

Class 5. Review; questions. Data-flow Analysis Review. Slicing overview Problem Set 2: due 9/3/09 Problem Set 3: due 9/8/09 Class 5 Review; questions Assign (see Schedule for links) Slicing overview Problem Set 2: due 9/3/09 Problem Set 3: due 9/8/09 1 Data-flow Analysis Review Start at slide 21 of Basic Analysis 3 1 Static

More information

Discrete Mathematics. 2. Relations

Discrete Mathematics. 2. Relations Discrete Mathematics 2. Relations Binary Relations Let A, B be any two sets. A binary relation R from A to B is a subset of A B. E.g., Let < : N N : {(n,m) n < m} The notation a R b or arb means (a,b)îr.

More information

Graphs, matroids and the Hrushovski constructions

Graphs, matroids and the Hrushovski constructions Graphs, matroids and the Hrushovski constructions David Evans, School of Mathematics, UEA, Norwich, UK Algebra, Combinatorics and Model Theory, Koç University, Istanbul August 2011. ACMT () August 2011

More information

Parallel & Distributed Systems group

Parallel & Distributed Systems group Happened Before is the Wrong Model for Potential Causality Ashis Tarafdar and Vijay K. Garg TR-PDS-1998-006 July 1998 PRAESIDIUM THE UNIVERSITY OF TEXAS DISCIPLINA CIVITATIS AT AUSTIN Parallel & Distributed

More information

2MA105 Algebraic Structures I

2MA105 Algebraic Structures I 2MA105 Algebraic Structures I Per-Anders Svensson http://homepage.lnu.se/staff/psvmsi/2ma105.html Lecture 12 Partially Ordered Sets Lattices Bounded Lattices Distributive Lattices Complemented Lattices

More information

Constraint satisfaction search. Combinatorial optimization search.

Constraint satisfaction search. Combinatorial optimization search. CS 1571 Introduction to AI Lecture 8 Constraint satisfaction search. Combinatorial optimization search. Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square Constraint satisfaction problem (CSP) Objective:

More information

Hill climbing: Simulated annealing and Tabu search

Hill climbing: Simulated annealing and Tabu search Hill climbing: Simulated annealing and Tabu search Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Hill climbing Instead of repeating local search, it is

More information

Definition: A binary relation R from a set A to a set B is a subset R A B. Example:

Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Chapter 9 1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B.

More information

Ramsey theory of homogeneous structures

Ramsey theory of homogeneous structures Ramsey theory of homogeneous structures Natasha Dobrinen University of Denver Notre Dame Logic Seminar September 4, 2018 Dobrinen big Ramsey degrees University of Denver 1 / 79 Ramsey s Theorem for Pairs

More information

Enumeration Schemes for Words Avoiding Permutations

Enumeration Schemes for Words Avoiding Permutations Enumeration Schemes for Words Avoiding Permutations Lara Pudwell November 27, 2007 Abstract The enumeration of permutation classes has been accomplished with a variety of techniques. One wide-reaching

More information

Appendix A. Definitions for Ordered Sets. The appendices contain all the formal definitions, propositions and proofs for

Appendix A. Definitions for Ordered Sets. The appendices contain all the formal definitions, propositions and proofs for 161 Appendix A Definitions for Ordered Sets The appendices contain all the formal definitions, propositions and proofs for developing a model of the display process based on lattices. Here we list some

More information